Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Upgrading Security Using a Retrofit Approach

By Diane Ritchey
September 1, 2009
John Doude, airport operations supervisor at the Brownsville-South Padre Island International Airport, tests the airport’s new access control system.


Facility security, especially at airports, can be very costly. However, Brownsville South Padre Island International Airport (BSPIIA) recently received a newly-retrofitted system that ranks as high in access control and security as larger international airports, but at a fraction of the traditional cost.

The airport was experiencing problems with its previous electronic access control vendor – it was unable to eliminate intermittent disruptions – which forced the airport to temporarily revert to its original manual keyed lock system to maintain security. Eventually, the previous access control system was only used to make ID badges.
     
BSPIIA was looking for an improved working electronic access control system in addition to upgrading overall security to the latest Transportation Safety Administration (TSA) compliances.
     
Since Brownsville doesn’t have a city aviation department like larger metropolitan areas, it worked with a consulting engineering firm, Ross & Baruzzini (R&B) in St. Louis, Mo., to design and manage a security retrofit.


Saving by Integrating

Instead of a “tear-down and start from scratch” strategy, BSPIIA was able to save tens of thousands of dollars in both labor and materials by having a retrofitted electronic access control system for less money. “Ten years ago it wouldn’t have been possible, but today’s advancements in technology have afforded BSPIIA’s access control software the same functionality as a huge multiple-terminal facility such as Miami International Airport,” said Theresa Smith, senior project manager, R&B.
     
BSPIIA used Matrix Systems’ Frontier software to integrate existing BSPIIA equipment as well as future ancillary component upgrades as they become available on the market.  
     
In addition to the software, Matrix Systems provided access control hardware consisting of a server, two networked workstations, one building controller, 10 reader control modules (RCM), and card readers for approximately 12 doors, bag belts and TSA security gates.


Unconventional Worked

The access control retrofit required some unconventional access control set-ups. Unlike larger airports where TSA checkpoints are open 24/7, the infrequency of off-peak flights at BSPIIA often requires closing and locking TSA checkpoints. BSPIIA wanted accountability on which officers closed and opened the gates and at what times, so the rolling overhead security grilles were outfitted with special card readers so that the access control software could record all of those events.  
     
In addition to retaining existing security video and cabling infrastructure, the airport wanted to integrate its three original circa 1950’s bag belts into the security system. The equipment was perfectly functional, however it was manufactured long before microprocessors were used to control and monitor baggage handling equipment. Furthermore, original schematics on their electro-mechanical controls were no longer available, which made their integration into the new access control software totally customized. “Replacing bag belts is a huge expense and bringing in additional contractors to solve the integration challenges would have raised the access control renovation costs significantly,” said Brown.
     
Also, much of the cable infrastructure remained in place at a savings to BSPIIA — a majority of the 12-volt and 24-volt DC cabling was reused in the re-design. 


The Result

In addition to saving money and salvaging many existing magnetic door lock/card reader combinations and bag belts, airport security officials now have access to real time recording of a security event. If a door is breached, for example, the access control system automatically activates the security system’s security video and digital video recording (DVR) to record the event in real time, but also saves what was recorded several seconds before the alarm was triggered.
     
In addition, if an alarm is activated, the new access control software notifies the airport director, airport operations supervisor, as well as other security staffers and administration via cell phone and email.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1118-talk-Feat-slide1_900px

    An All Hazards Approach

    See More
  • Boeing - Dave Komendat - Security Magazine

    Mitigating the Insider Threat: Boeing's Successful Approach

    See More
  • Security Talk Default

    Using Smartphone-Based Access Control to Keep Students Happy

    See More

Related Products

See More Products
  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing